WormExploitIntrusionVirusBreachSoftwareupdatesRansomwareAwarenessTrainingVulnerabilityPasswordSafe ToolExtorsionMalwareDarkwebTrainingMulti-factorauthentication(MFA)Personallyidentifiableinformation(PII)CompromiseEncryptionZero-daySpearphishingPhishing12CharacterPasswordsWhalephishingScreenlockpolicyWormExploitIntrusionVirusBreachSoftwareupdatesRansomwareAwarenessTrainingVulnerabilityPasswordSafe ToolExtorsionMalwareDarkwebTrainingMulti-factorauthentication(MFA)Personallyidentifiableinformation(PII)CompromiseEncryptionZero-daySpearphishingPhishing12CharacterPasswordsWhalephishingScreenlockpolicy

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Worm
  2. Exploit
  3. Intrusion
  4. Virus
  5. Breach
  6. Software updates
  7. Ransomware
  8. Awareness Training
  9. Vulnerability
  10. Password Safe Tool
  11. Extorsion
  12. Malware
  13. Dark web
  14. Training
  15. Multi-factor authentication (MFA)
  16. Personally identifiable information (PII)
  17. Compromise
  18. Encryption
  19. Zero-day
  20. Spear phishing
  21. Phishing
  22. 12 Character Passwords
  23. Whale phishing
  24. Screen lock policy